Good Info Security is Annoying!

Post on 10-Jun-2015

100 views 2 download

Tags:

description

The truth is good Info security is annoying for us but it is even more annoying for the enemy!

Transcript of Good Info Security is Annoying!

Good Security is Annoying

Presented by: Nick Lane

January 23rd, 2014

Who belongs here?• IT beginners• IT professionals• Office workers

What will you learn? • Who is New Horizons Computer Learning Centers• Security basics• Importance of security• Training options

Welcome!

Who is New Horizons?

New Horizons is a proven, worldwide training provider with flexible learning solutions covering a broad spectrum of topics taught by industry-leading instructors.

Facts to ConsiderLargest International Network • 2,100 Classrooms

• 2,400 Instructors in 56 Countries

• 3 Million Student Days of Training per Year

Flexible, Integrated Learning Methods • ILT – Instructor Led Training

• OLL – Online Live Virtual Delivery

• Private Group Training customized for your

organization

Strong Vendor Partnerships

InstructorNicholas Lane• Technical Instructor at New Horizons of Southern California• Two-time “Top 25 Technical Instructor in the World”• New Horizons trainer since 2005• IT certified since 1998

Certifications:• CEI• CEH• UKICI• MCT• MCITP• MCSE

• MCSA• MCTS• MCP• MOS• SMSP• Cloud Essentials

• Cloud+• Security+• Network+• A+

• Security sure seems annoying!

• Increasing security decreases our

freedoms

• Increasing security decreases our ease

of use

• Increasing security decreases our

functionalities

So…who found themselves too annoyed to implement good security recently?

Because………

The default usernames and passwords weren’t changed on many of the point-of-sales terminals in their stores.

As a result…….

My credit card was stolen

Oh and….

.... other credit cards too

Increasing security decreases enemy freedoms more

Increasing security decreases enemy ease of use more

Increasing security decreases enemy functionality more!

The truth is good security is annoying for us but it is more annoying for the enemy.

Security Basics: The infamous security triangle and the dot……

Security Basics: The other triangle……

Security Basics: Who are you and how do I know?

Security Basics: Security is like an onion because it is best implemented in layers.

Source:

www.stopthehacker.com

Training options:40032 Networking and Security Fundamentals

50094 Deploying and Administering Microsoft Forefront Security

5049 Managing Messaging Security using Microsoft Exchange Server 2007

Certified Ethical Hacker (CEH) v8.0

Certified Information Security Manager (CISM)

Certified Information System Security Professional (CISSP)

Cisco® Deploying Cisco® ASA Firewall Features v2.0 (FIREWALL)

Cisco® Deploying Cisco® ASA VPN Solutions v2.0 (VPN)

Cisco® Implementing Cisco® Intrusion Prevention System v7.0 (IPS)

Cisco® Implementing Cisco® IOS Network Security v2.0 (IINS)

Cisco® Securing Networks with Cisco® Routers and Switches v1.0 (SECURE)

CompTIA Advanced Security Practitioner (CASP)

CompTIA Security+ Certification

CompTIA Social Media Security Professional (SMSP)

Computer Hacking Forensics Investigator (CHFI) v8.0

Strategic Infrastructure Security

Systems Security Certified Practitioner (SSCP®)

VMware® vCloud Networking & Security for vSphere Professionals v5.1

Visit www.nhsocal.com and search for “security”

Courses, Outlines, Delivery Methods, Length, and Locations

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50

Certified Ethical Hacker – Course Description

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Certified Ethical Hacker – Target Audience

Labs include latest OS’s, built-in instructions, and 24/7 access from anywhere

Questions?